Login / Signup

A Generic Methodology for the Modular Verification of Security Protocol Implementations.

Linard ArquintMalte SchwerhoffVaibhav MehtaPeter Müller
Published in: CCS (2023)
Keyphrases
  • automated design
  • security protocols
  • cryptographic protocols
  • artificial immune algorithm
  • cryptographic algorithms
  • security services
  • key management
  • authentication protocol
  • model checking
  • information systems